Introduction As cybersecurity challenges grow more complex, the tools we use to protect data and communications are also advancing. Among…
NSO Group used WhatsApp exploits even after Meta-owned company sued it Pierluigi Paganini November 16, 2024 Court filing revealed that…
In perhaps the most adorable hacker story of the year, a trio of technologists in India found an innovative way…
Nov 16, 2024Ravie LakshmananVulnerability / Network Security Palo Alto Networks has released new indicators of compromise (IoCs) a day after…
Hackers with ties to Chinese intelligence infiltrated multiple U.S. and international telecom companies, including T-Mobile, in a prolonged cyber-espionage campaign…
A threat actor known as BrazenBamboo has exploited an unresolved security flaw in Fortinet’s FortiClient for Windows to extract VPN…
The NSO Group, an Israeli surveillance technology firm, is facing significant legal challenges after a U.S. court filing revealed damning…
OpenBSD has released an important bug fix addressing a potential double-free vulnerability within its Network File System (NFS) client and…
Glove Stealer bypasses Chrome’s App-Bound Encryption to steal cookies Pierluigi Paganini November 16, 2024 The Glove Stealer malware exploits a…
Integrating AI into SOCs The integration of AI into security operations centers (SOCs) and its impact on the workforce are…
What is HAQL? Back in 2022, we were faced with a challenge: we wanted to build useful, actionable dashboards for…
Israeli surveillance firm NSO Group reportedly used multiple zero-day exploits, including an unknown one named “Erised,” that leveraged WhatsApp vulnerabilities…











